exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 124 RSS Feed

Files from Matthias Deeg

First Active2014-09-01
Last Active2024-09-06
C-MOR Video Surveillance 5.2401 / 6.00PL01 Command Injection
Posted Sep 6, 2024
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de

C-MOR Video Surveillance versions 5.2401 and 6.00PL01 suffer from a command injection vulnerability.

tags | exploit
advisories | CVE-2024-45179
SHA-256 | e6ab13a0246110b44dcdf4979931f3c724f8288c7be0ae45d14d5e88b8828ed4
C-MOR Video Surveillance 5.2401 Insecure Third-Party Components
Posted Sep 6, 2024
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de

C-MOR Video Surveillance version 5.2401 makes use of unmaintained vulnerability third-party components.

tags | advisory
advisories | CVE-2017-3167, CVE-2017-9798
SHA-256 | 50868d349c84704995bd17063b29d34678bda3760321be0ea29d00df62e4fce6
C-MOR Video Surveillance 5.2401 / 6.00PL01 Information Disclosure / Cleartext Secret
Posted Sep 6, 2024
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de

C-MOR Video Surveillance versions 5.2401 and 6.00PL01 stores sensitive information, such as credentials, in clear text.

tags | exploit
advisories | CVE-2024-45175
SHA-256 | 8db1a14276a8b4afd861e338c4174f26f883c0e15f48c5cde474fcac3953dedd
C-MOR Video Surveillance 5.2401 / 6.00PL01 Privilege Escalation
Posted Sep 6, 2024
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de

C-MOR Video Surveillance versions 5.2401 and 6.00PL01 suffer from an improper privilege management vulnerability that can allows for privilege escalation.

tags | exploit
advisories | CVE-2024-45173
SHA-256 | 2f2ea225657058c95e1bc52540ab6b85b8f472f2bc7c04ebb877194055c37e90
C-MOR Video Surveillance 5.2401 Remote Shell Upload
Posted Sep 6, 2024
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de

C-MOR Video Surveillance version 5.2401 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
advisories | CVE-2024-45171
SHA-256 | 787e5049c9d126f909aa923e05bb07cd07413bc5154345d71f346e74ec5c9114
C-MOR Video Surveillance 5.2401 Path Traversal
Posted Sep 6, 2024
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de

C-MOR Video Surveillance version 5.2401 suffers from a path traversal vulnerability.

tags | exploit
advisories | CVE-2024-45178
SHA-256 | 6fe58f550278f2bf7107e64be242c5fbad1b8ffd839d50b19fc56c102e4780e2
C-MOR Video Surveillance 5.2401 Improper Access Control
Posted Sep 6, 2024
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de

C-MOR Video Surveillance version 5.2401 suffers from an improper access control privilege escalation vulnerability that allows for a lower privileged user to access administrative functions.

tags | exploit
advisories | CVE-2024-45170
SHA-256 | 32777de2ae7cbdb7a5ea02bd7eb88688b8d67865352de7b14c8e41c4d0568f1a
C-MOR Video Surveillance 5.2401 / 6.00PL01 SQL Injection
Posted Sep 6, 2024
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de

C-MOR Video Surveillance versions 5.2401 and 6.00PL01 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2024-45174
SHA-256 | 3631436bc00a5ef9505d823e81f823511bc49dc2698141fab1c6e02a8b517a74
C-MOR Video Surveillance 5.2401 / 6.00PL01 Cross Site Request Forgery
Posted Sep 6, 2024
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de

C-MOR Video Surveillance versions 5.2401 and 6.00PL01 suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2024-45172
SHA-256 | 280ac578aec4b568b932c6180b77dd607186ef35d18e5d6e3f81d7c2e2a25b04
C-MOR Video Surveillance 5.2401 / 6.00PL01 Cross Site Scripting
Posted Sep 6, 2024
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de

C-MOR Video Surveillance versions 5.2401 and 6.00PL01 suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2024-45177
SHA-256 | 1c20fdc720d1f9d37d1f2af502f48729eb04135e13883038d161f9835b8b3f55
C-MOR Video Surveillance 5.2401 Cross Site Scripting
Posted Sep 6, 2024
Authored by Matthias Deeg, Chris Beiter, Frederik Beimgraben | Site syss.de

C-MOR Video Surveillance version 5.2401 suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2024-45176
SHA-256 | b6dd21760972bd50552c5c42a0225c1feee7b02dec561b4da5ec6673a6543af4
AudioCodes VoIP Phones Insufficient Firmware Validation
Posted Aug 16, 2023
Authored by Matthias Deeg, Moritz Abrell | Site syss.de

AudioCodes VoIP Phones with firmware versions greater than or equal to 3.4.4.1000 have been found to have validation of firmware images that only consists of simple checksum checks for different firmware components.

tags | exploit
advisories | CVE-2023-22955
SHA-256 | 87f14d8fb3d841332987f94e0d0b781df7d013b6b805f919c5e4b88c417fe4f0
Omnis Studio 10.22.00 Library Unlock
Posted Jul 24, 2023
Authored by Matthias Deeg | Site syss.de

Omnis Studio version 10.22.00 suffers from a locked class bypass vulnerability.

tags | advisory, bypass
advisories | CVE-2023-38334
SHA-256 | 70baa8a88b3de2130acfbd71ec3e460da1f75e0d1808158d3e555ff37a98c8f0
Omnis Studio 10.22.00 Library Setting Bypass
Posted Jul 24, 2023
Authored by Matthias Deeg | Site syss.de

Omnis Studio version 10.22.00 suffers from a private library access bypass vulnerability.

tags | advisory, bypass
advisories | CVE-2023-38335
SHA-256 | 53637e29b7365ce0e3a3037d27a08a606b6472cc022aa871d1d1d277c7cbca39
Verbatim Store 'n' Go Secure Portable SSD Behavior Violation
Posted Oct 10, 2022
Authored by Matthias Deeg | Site syss.de

When analyzing the external data storage Verbatim Store 'n' Go Secure Portable SSD, Matthias Deeg found out that the device will not lock and require reformatting after 20 failed passcode attempts, as described in the product description and the corresponding user manual.

tags | advisory
advisories | CVE-2022-28386
SHA-256 | 08145b3fed5af98f2c1a58867fcffc5c6a963943711eed8b147ca33d079c84b8
Verbatim Store 'n' Go Secure Portable SSD Missing Trust
Posted Oct 10, 2022
Authored by Matthias Deeg | Site syss.de

When analyzing the external data storage Verbatim Store 'n' Go Secure Portable SSD, Matthias Deeg found out that the validation of the firmware for the USB-to-SATA bridge controller INIC-3637EN only consists of a simple CRC-16 check (XMODEM CRC-16).

tags | advisory
advisories | CVE-2022-28383
SHA-256 | d39be10e67c9b627d81d5563e3043fc1643ed064d12773022e54946e4d13c40c
Verbatim Store 'n' Go Secure Portable SSD Weak Cryptography
Posted Oct 10, 2022
Authored by Matthias Deeg | Site syss.de

When analyzing the external storage device Verbatim Store 'n' Go Secure Portable SSD, Matthias Deeg found out that the firmware of the USB-to-SATA bridge controller INIC-3637EN uses AES-256 with the ECB (Electronic Codebook) mode.

tags | advisory
advisories | CVE-2022-28382
SHA-256 | 94cc2f212c629f6d55adb277c12c057ade203121d15ef2c833dae91f93644f56
Verbatim Store 'n' Go Secure Portable SSD Weak Cryptography
Posted Oct 10, 2022
Authored by Matthias Deeg | Site syss.de

When analyzing the external storage device Verbatim Store 'n' Go Secure Portable SSD, Matthias Deeg found out that it uses an insecure design which allows for offline brute-force attacks against the passcode.

tags | advisory
advisories | CVE-2022-28384
SHA-256 | 1eec8f74130bb65d97f78635534eca25e6988ba281f9bc35cc664431829d03d5
Lepin EP-KP001 KP001_V19 Authentication Bypass
Posted Jun 20, 2022
Authored by Matthias Deeg | Site syss.de

When analyzing the USB flash drive Lepin EP-KP001, Matthias Deeg found out that it uses an insecure hardware design which allows an attacker to bypass the password-based user authentication.

tags | exploit
advisories | CVE-2022-29948
SHA-256 | aab63ef3bc7b1c7a28a491f23ff3e38331ea8654041288aca94a8bd6d5435366
Verbatim Executive Fingerprint Secure SSD GDMSFE01-INI3637-C VER1.1 Insufficient Verification
Posted Jun 20, 2022
Authored by Matthias Deeg | Site syss.de

When analyzing the Verbatim Executive Fingerprint Secure SSD, Matthias Deeg found out that the content of the emulated CD-ROM drive containing the Windows and macOS client software can be manipulated. The content of this emulated CD-ROM drive is stored as ISO-9660 image in the "hidden" sectors of the USB drive that can only be accessed using special IOCTL commands, or when installing the drive in an external disk enclosure.

tags | advisory
systems | windows
advisories | CVE-2022-28385
SHA-256 | 26ff4e832d69529801ce9581fa340d311be8da080d073cf03ef28644ddb30a51
Verbatim Executive Fingerprint Secure SSD GDMSFE01-INI3637-C VER1.1 Missing Trust
Posted Jun 20, 2022
Authored by Matthias Deeg | Site syss.de

When analyzing the Verbatim Executive Fingerprint Secure SSD, Matthias Deeg found out that the validation of the firmware for the USB-to-SATA bridge controller INIC-3637EN only consists of a simple CRC-16 check (XMODEM CRC-16). Thus, an attacker is able to store malicious firmware code for the INIC-3637EN with a correct checksum on the used SPI flash memory chip (XT25F01D), which then gets successfully executed by the USB-to-SATA bridge controller.

tags | advisory
advisories | CVE-2022-28383
SHA-256 | 6fe888a83e3d60fa3dff9cbd864af7c01af27b2dbd4a6cda8d208d3d0a240337
Verbatim Fingerprint Secure Portable Hard Drive #53650 Insufficient Verification
Posted Jun 20, 2022
Authored by Matthias Deeg | Site syss.de

When analyzing the Verbatim Fingerprint Secure Portable Hard Drive, Matthias Deeg found out that the content of the emulated CD-ROM drive containing the Windows and macOS client software can be manipulated. The content of this emulated CD-ROM drive is stored as ISO-9660 image in the "hidden" sectors of the USB drive that can only be accessed using special IOCTL commands, or when installing the drive in an external disk enclosure.

tags | advisory
systems | windows
advisories | CVE-2022-28385
SHA-256 | 820817b00f35d5e9cdd824108c5f8d3d74d064b3343d74f7c689cef4f9919f97
Verbatim Fingerprint Secure Portable Hard Drive #53650 Missing Trust
Posted Jun 20, 2022
Authored by Matthias Deeg | Site syss.de

When analyzing the Fingerprint Secure Portable Hard Drive, Matthias Deeg found out that the validation of the firmware for the USB-to-SATA bridge controller INIC-3637EN only consists of a simple CRC-16 check (XMODEM CRC-16). Thus, an attacker is able to store malicious firmware code for the INIC-3637EN with a correct checksum on the used SPI flash memory chip (XT25F01B), which then gets successfully executed by the USB-to-SATA bridge controller.

tags | advisory
advisories | CVE-2022-28383
SHA-256 | 5cf09b9a6a7dc17bc2bc9248633676029f1f2f7c319f1bda1a93395588b69053
Verbatim Fingerprint Secure Portable Hard Drive #53650 Risky Crypto
Posted Jun 20, 2022
Authored by Matthias Deeg | Site syss.de

When analyzing the Verbatim Fingerprint Secure Portable Hard Drive, Matthias Deeg found out that the firmware of the USB-to-SATA bridge controller INIC-3637EN uses AES-256 with the ECB (Electronic Codebook) mode. This operation mode of block ciphers like AES encrypts identical plaintext data, in this case blocks of 16 bytes, always to identical ciphertext data. For some data, for instance bitmap images, the lack of the cryptographic property called diffusion concerning the ECB mode can leak sensitive information even in encrypted data.

tags | advisory
advisories | CVE-2022-28382
SHA-256 | 5957d6ef4f65feb57e39fb3699989b7271db9a941fefc0a0ecfcc6d07e41f538
Verbatim Fingerprint Secure Portable Hard Drive #53650 Risky Crypto
Posted Jun 20, 2022
Authored by Matthias Deeg | Site syss.de

When analyzing the Verbatim Fingerprint Secure Portable Hard Drive, Matthias Deeg found out it uses an insecure design which allows retrieving the currently used password and thus the ability to unlock and access the stored data in an unauthorized way.

tags | advisory
advisories | CVE-2022-28387
SHA-256 | bf98542c479e3621d63c8f97f240d1176143d928dd39fcee82bda83c3c2f65d1
Page 1 of 5
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close